Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Implementing Zero Trust with FIM and SCM

By Chris Hudson
SEC0719-Privacy-Feat-slide1_900px
July 27, 2020

Zero Trust model creator John Kindervag puts it like this: “The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.” He came up with the model in 2010, at a time when many businesses were just beginning to put foundational cybersecurity controls in place and over-relied on the assumed security inside their enterprise-owned network boundaries.  

Traditional cybersecurity best practices were heavily focused on protecting the boundaries of the private network. Unfortunately, this led to a certain level of implicit trust toward any activity taking place inside the network—a perfect cognitive blindspot for threat actors to exploit.

What is Zero Trust?

The Zero Trust model suggests that all activity taking place, even inside your trusted network, requires the same level of scrutiny and verification as you would use with activity coming from outside the network. With the proliferation of bring-your-own-device and remote workforce culture, new risks are constantly introduced to the network. Doing away with the notion of “trusted” users and devices helps security teams stay vigilant.

Looking at all interactions as unverified leads security practitioners to make a greater effort to establish controls to authenticate and secure user behavior as if it’s coming from a potential threat.

The Microsoft strategy

Microsoft provides a set of three critical security objectives you can use as the basis for enacting Zero Trust within your IT environment, as listed here:

  1. Verify explicitly

Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification and anomalies.

  1. Use least privileged access

Limit user access with Just-In-Time and Just-Enough Access (JIT/JEA), risk-based adaptive policies and data protection to protect both data and productivity.

  1. Assume breach

Minimize blast radius for breaches and prevent lateral movement by segmenting access by network, user, devices and application awareness. Verify all sessions are encrypted end-to-end. Use analytics to get visibility, drive threat detection and improve defenses.

 

Enter SCM and FIM

Security configuration management (SCM) and file integrity monitoring (FIM) are two of the most important security controls you can add to your arsenal to enact the Zero Trust model in your network. If you’re not already familiar with these practices, let’s start with a quick description of each:

  • SCM: SCM is a security practice that combines elements of vulnerability assessment, automated remediation, and configuration assessment. It reduces security risks by ensuring that systems are properly configured—hardened—to meet internal and/or regulatory security and compliance standards.
  • FIM: FIM is the security technology pioneered by Tripwire that monitors and detects changes in your environment to detect and remediate cybersecurity threats. FIM actually goes beyond the files, and monitors for system integrity, alerting you to unauthorized changes across n servers, databases, network devices, directory servers, applications, cloud environments and virtual images.

 

Next, we can explore a couple of quick examples of the ways SCM and FIM can help you put Zero Trust into practice:

  • Access creep abatement: SCM can aid in enforcing the JIT/JEA policies suggested by Microsoft above. Access creep is a common issue that occurs when a user’s permissions grow over time without routine reassessment. Access should be reduced when resources are no longer needed by the user. Permissions can quickly become excessive on file systems, and an SCM tool leveraging policy-based audits can keep the problem in check across all your devices. Your SCM tool should also alert you at any point when unnecessary access creates risk.
  • Real-time change monitoring: FIM tools track changes across your users and devices to give you a clear picture of what changes are authorized or unauthorized so that you can remediate on any unexpected change or risk. Combined with agents that provide real-time monitoring, FIM tools give you enough visibility into what’s happening on your network to help enforce Zero Trust.

 

Zero Trust isn’t a benchmark you can “achieve,” but a network-hardening approach that merits ongoing effort over time. Even if you only dip your toes into the Zero Trust model, your security program stands to benefit in the long run.

KEYWORDS: cyber security information security network security risk management zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris hudson tripwire

Chris Hudson has spent longer than he cares to admit in server rooms across the world and even longer sat in front of a computer screen. As part of Tripwire’s EMEA Professional Services team he helps clients make the most of their investment in Tripwire products including TE, IP360, CCM and SIH.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • zero trust-freepik1170x658v59703.png

    The fundamentals of implementing a zero trust security policy

    See More
  • Zero-trust-freepik

    US security must start with zero trust

    See More
  • 5 mins with Soroko

    5 minutes with Jason Soroko - The importance of zero trust during COVID-19

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing